Security enhancement on an anonymous authentication scheme for wireless communications using smart cards

被引:5
|
作者
Wu, Xili [1 ]
Qu, Juan [2 ]
Feng, Yuming [1 ,3 ]
机构
[1] Chongqing Three Gorges Univ, Key Lab Intelligent Informat Proc & Control, Chongqing 404100, Peoples R China
[2] Chongqing Three Gorges Univ, Sch Math & Stat, Chongqing 404100, Peoples R China
[3] Chongqing Three Gorges Univ, Chongqing Engn Res Ctr Internet Things & Intellig, Chongqing 404100, Peoples R China
关键词
Authentication; Password; Wireless communication; Smart card; Anonymity;
D O I
10.1080/09720529.2018.1489426
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the development of wireless communication technology, user anonymity authentication for wireless communication network has become increasingly important. In this paper, we revisit an anonymous authentication scheme for wireless communications using smart cards presented by Lu et al. in 2015. We show that, this scheme is vulnerable to off-line password guessing attack, man-in-the-middle attack in session key change phase, trace attack and unsuccessful key agreement. To fix these identified drawbacks, we proposed an enhanced anonymous authentication scheme. The proposed scheme is provably secure and protects active and passive attacks under ECCDH assumption in the random oracle model. Further, we compared the proposed scheme with other related protocol. The results shows that the proposed scheme is practically suitable for wireless environments.
引用
收藏
页码:1139 / 1155
页数:17
相关论文
共 50 条
  • [31] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [32] Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications
    Liu, Chang-Shiun
    Xu, Li
    Lin, Limei
    Tseng, Min-Chi
    Lin, Shih-Ya
    Sun, Hung-Min
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 47 - 61
  • [33] Security analysis of a nonce-based user authentication scheme using smart cards
    Nam, Junghyun
    Kim, Seungjoo
    Park, Sangjoon
    Won, Dongho
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 299 - 302
  • [34] Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security"
    Xu, Meijia
    Dong, Qiying
    Zhou, Mai
    Wang, Chenyu
    Liu, Yangyang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [35] Security improvement on the timestamp-based password authentication scheme using smart cards
    Wang, Xiaomin
    Zhang, Jiashu
    Zhang, Wenfang
    Khan, Muhammad Khurram
    2006 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF INTELLIGENT SYSTEMS, 2006, : 140 - +
  • [36] A security enhanced timestamp-based password authentication scheme using smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (11) : 1885 - 1888
  • [37] On the security of ID-based password authentication scheme using smart cards and fingerprints
    Lin, CH
    Lin, TS
    Lin, HH
    Lai, YY
    ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, : 230 - 232
  • [38] Security analysis and improvement of the remote user authentication scheme without using smart cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    ICIC Express Letters, 2010, 4 (6 B): : 2431 - 2436
  • [39] Security enhancement on an improvement on two remote user authentication schemes using smart cards
    Chen, Tien-Ho
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2011, 27 (04): : 377 - 380
  • [40] Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
    Choi, Younsung
    Nam, Junghyun
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Won, Dongho
    SCIENTIFIC WORLD JOURNAL, 2014,